Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Hardware Vs Software Encryption - Comparison
1. Software Versus Hardware Encryption
Software Hardware
NO
Consumes Valuable Computer Resources YES Encryption/Decryption is taken
(CPU Cycles, Memory)
care by HDD
Open To Attack NO
YES
Key Generation Exposed, Unique & certified methods of
hiding secrets.
Key Storage Accessible to OS
Open To Snoop
YES NO
Encryption Process Observable in PC Memory
Risk of (users/malware) Turning Encryption Off NO
YES
Danger of non-compliance Always ON Encryption
NO
FDE needs to be Turned Off during OS
Sometimes Encryption/Decryption is
Updates/Maintenance
completely transparent
EASY
IT Ease of Deployment, Management Moderate to Difficult
through Retirement (Repurpose/Disposal) Substantially Lower TCO
Subject to Princeton/Cold Boot Attack YES NO
Drive Locking, Strong Access Control NO YES
YES
Secure Crypto Erase Sometimes
Repurposes drives in seconds